On Thu, 5 Nov 2020, Steven Rostedt wrote: > From: "Steven Rostedt (VMware)" <[email protected]> > > If for some reason a function is called that triggers the recursion > detection of live patching, trigger a warning. By not executing the live > patch code, it is possible that the old unpatched function will be called > placing the system into an unknown state. > > Link: https://lore.kernel.org/r/20201029145709.GD16774@alley > > Cc: Josh Poimboeuf <[email protected]> > Cc: Jiri Kosina <[email protected]> > Cc: Joe Lawrence <[email protected]> > Cc: [email protected] > Suggested-by: Miroslav Benes <[email protected]> > Reviewed-by: Petr Mladek <[email protected]> > Signed-off-by: Steven Rostedt (VMware) <[email protected]>
Acked-by: Miroslav Benes <[email protected]> > --- > Changes since v2: > > - Blame Miroslav instead of Petr ;-) Thanks. Fortunately, if printk is broken in WARN_ON_ONCE(), I can always blame Petr again :) M

